Author:
Tao Xiaoling,Liu Runrong,Fu Lianyou,Qiu Qiqi,Yu Yuelin,Zhang Haijing
Publisher
Springer Nature Switzerland
Reference24 articles.
1. Verble, J.: The NSA and Edward Snowden: surveillance in the 21st century. ACM SIGCAS Comput. Soc. 44(3), 14–20 (2014)
2. Kim, A., Oh, J., Ryu, J., Lee, J., Kwon, K., Lee, K.: SoK: a systematic review of insider threat detection. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 46–67 (2019)
3. Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., Ochoa, M.: Insight into insiders and it: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Comput. Surv. (CSUR) 52(2), 1–40 (2019)
4. Cost of Insider Threats Report. https://www.ibm.com/security/digital-assets/services/cost-of-insider-threats/. Accessed 19 May 2022
5. Alsowail, R.A., Al-Shehari, T.: Empirical detection techniques of insider threat incidents. IEEE Access 8, 78385–78402 (2020)